this post was submitted on 30 Sep 2023
170 points (98.3% liked)
Technology
59157 readers
2307 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I guess I should take a course on threat analysis, because I don't have a clue how to determine how dangerous this is.
the pixel is the just the base unit.. expand the exploit and you get 'images'. any image on the remote site... and from there you could target sites that use imaging for password/username stuff (as a method of preventing text-based exploits).
the one pixel leads to lots of nonsense
its a teeny tiny hole, but thats all you need
That and apparently a lot of time. Am I right in reading it could take hours to leak enough pixels to form an image? So to get a password the password would need to be plain text, visible on the target website, and not be moved, removed or otherwise changed for hours.
yeah, but if it takes 215 minutes to get just a single word... I mean, I'm not going to have a webpage open for that long.